Sign Up to like & get
recommendations!
2
Published in 2022 at "Micromachines"
DOI: 10.3390/mi13111872
Abstract: Cryptographic algorithms (RSA, DSA, and ECC) use modular exponentiation as part of the principal operation. However, Non-profiled Side Channel Attacks such as Simple Power Analysis and Differential Power Analysis compromise cryptographic algorithms that use such…
read more here.
Keywords:
algorithm;
number;
sca safe;
implementation modified ... See more keywords